CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Cyber Security
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Cyber Security

Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.

 

So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.

 

It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.

 

Image of hacker holding magnifying glass peering over shoulder of boy using mobile phone signifying the need to protect against identity theft
Cyber SecurityInsights

Identity Theft: Protecting Your Real Life

September 22, 2017
Your identity is something valuable and identity theft in the digital world can have real life consequences. Protection is a shared responsibility.
Read More
Image of stethoscope and syringe on laptop keyboard representing malware detection
Cyber SecurityNews

When Good Turns Bad: Malware Detection May Not Help

September 21, 2017
The 'only install applications from a trusted source' mantra no longer holds true, as supply chain attacks bypass malware detection solutions and practices.
Read More
Image of locks, keys and fishing hook on keyboard representing how businesses are victims of phishing attacks
Cyber SecurityInsights

Phishing for Data: All Businesses are Victims

September 20, 2017
Phishing attacks account for 49% of cybercrime, making them the biggest threat to your company's cyber security. Is your company and employees protected?
Read More
Image of mobile phone with privacy login screen showing the need for Instagram two-factor authentication
Cyber SecurityNews

Time to Turn on That Instagram Two-Factor Authentication

September 6, 2017
With six million Instagram accounts hacked, are passwords now a liability and is it time to turn on that Instagram two-factor authentication?
Read More
Image of Indians using their mobile phones representing cyber security standards mandated by the Indian government on phone makers
Cyber SecurityNews

Indian Government Mandates Cyber Security Standards for Phone Makers

September 4, 2017
Indian government subjects phone makers to cyber security standards and are required to report their hardware, software and network security measures by August 28th.
Read More
Image of robot army representing an Android botnet
Cyber SecurityNews

Are You Unknowingly Part of an Android Botnet?

September 2, 2017
Last week, Google announced the removal of around 300 Android apps found with malware that secretly hijacks your phone to...
Read More
Image of hacker making shooting gesture at a laptop representing anti-hacker and phishing tips revealed by hacking the hackers
Cyber SecurityNews

Hacking the Hackers Reveals Anti-Hacker and Phishing Tips

August 22, 2017
Imperva reversed the phishing hook to hack the hackers, proving that these 'professionals' are just as susceptible – and in the process reveals some very important anti-hacker lessons.
Read More
Image of mobile phone with protected icon and surrounded by devices representing how IoT security and privacy is tackled by the updated NIST 800-53
Cyber SecurityNews

Revision of NIST 800-53 Tackles IoT Security and Privacy

August 19, 2017
With rising risks of Internet of Things, the draft of the NIST 800-53 revision 5 addresses IoT security and privacy challenges head on.
Read More
Image of a dead bug on keyboard representing how the Hack the Air Force bug bounty program has found 207 vulnerabilities
Cyber SecurityNews

Hack the Air Force Bug Bounty Program Yields 207 Vulnerabilities

August 10, 2017
For 24 days, 272 hackers pounded the Air Force's key public websites. The result? A cool 207 vulnerabilities were found, resulting in a $130,000 payday for the White Hats.
Read More
Image of hooded hacker in front of keyboard and surrounded by floating locks representing how to stop ransomware attacks
Cyber SecurityInsights

Five Ways to Stop Ransomware Attacks from Ruining Your Day

July 26, 2017
Ransomware attacks are the frightening new hacking phenomenon that is hitting businesses all over the world. Here are five ways to stop ransomware attacks.
Read More
1 … 283 284 285 286 287

Latest

Mobile phone and lock icons showing messaging app security breach

High Security Messaging App Tool Used by US Government Suspends Service After Security Breach

TikTok logo on smartphone showing data transfers of EU data

TikTok to Receive €530 Million Fine Over EU Data Storage, Data Transfers to China

Headset on laptop showing IT help desks social engineering attack

IT Help Desks Across UK Victimized by “DragonForce” Social Engineering Attack

Hacker using laptop showing data theft from cyber attack

The Co-op Confirms Significant Data Theft from an Apparent Dragonforce Ransomware Cyber Attack

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources
Press Releases

© 2024 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    Data Breach U.S. Regulations Cyber Attack EU GDPR
    See all results